Changeset 4205c07 for doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex
- Timestamp:
- Aug 13, 2025, 3:10:35 PM (5 weeks ago)
- Branches:
- master
- Children:
- 331f59a
- Parents:
- 0d6fd21
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex
r0d6fd21 r4205c07 132 132 Often array is part of the programming language, while linked-list is built from (recursive) pointer types, and string from a combination of array and linked-list. 133 133 For all three types, languages and/or their libraries supply varying degrees of high-level mechanisms for manipulating these objects at the bulk and component level, such as copying, slicing, extracting, and iterating among elements. 134 Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%- 80\% of hacker attack-vectors target these types.134 Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%--80\% of hacker attack-vectors target these types. 135 135 Therefore, hardening these three C types goes a long way to make the majority of C programs safer. 136 136
Note:
See TracChangeset
for help on using the changeset viewer.